Business Tools Quiz
34 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

It is important to note that the items are small so they can be easily ______

lost

The tools represent an investment to the ______ business

significant

Their use or loss can represent a significant ______ to the business

cost

These tools will generally require ______ to prevent damage

<p>training</p> Signup and view all the answers

They are attractive in terms of ______ and can be attractive to a potential thief

<p>cost</p> Signup and view all the answers

Telephones can have call-barring where certain numbers are not ______.

<p>available</p> Signup and view all the answers

Overriding codes can be made to managers that allow them to make any call from any ______.

<p>telephone</p> Signup and view all the answers

Agreements can be created that allow for personal ______ up to a set level.

<p>access</p> Signup and view all the answers

Non-essential downloads can consume precious bandwidth and slow internet ______ for legitimate access.

<p>access</p> Signup and view all the answers

Downloads may involve objectionable material that can offend other ______.

<p>employees</p> Signup and view all the answers

Email also presents similar challenges as web ______.

<p>surfing</p> Signup and view all the answers

Internet presents a wide range of opportunities to misuse and abuse ______.

<p>resources</p> Signup and view all the answers

Traditional policies indicate that employees have not been allowed to frequent an ______.

<p>establishment</p> Signup and view all the answers

Possible rules for a password include its ______, how many characters, and composition.

<p>length</p> Signup and view all the answers

A method to reset the ______ is necessary for any system.

<p>password</p> Signup and view all the answers

The password cannot be ______ by anyone in the system.

<p>read</p> Signup and view all the answers

Rules may specify how many ______ or capital letters are required in a password.

<p>numbers</p> Signup and view all the answers

A process will be required to reset passwords if they have been ______.

<p>forgotten</p> Signup and view all the answers

The document could be a piece of paper with the relevant details or it could be an ______.

<p>email</p> Signup and view all the answers

For some tools, there will be ______ that need to be followed when the tool is returned.

<p>procedures</p> Signup and view all the answers

Portable computers may also need to be ______ ready for next use.

<p>recharged</p> Signup and view all the answers

There should be an inspection for damage and normal wear and ______.

<p>tear</p> Signup and view all the answers

Some tools will require a roster to allow users to plan for ______.

<p>access</p> Signup and view all the answers

Users can book use of the tool in a ______ that can be paper or electronic.

<p>diary</p> Signup and view all the answers

There are various tools available from simple to complicated system-wide ______ systems.

<p>computer</p> Signup and view all the answers

A roster allows planning for events when the tool is being used by ______.

<p>another</p> Signup and view all the answers

Allowing users to connect memory sticks and other ______ provides an opportunity to infect the computer system.

<p>equipment</p> Signup and view all the answers

There is also a consideration of sending and receiving personal email over the ______ system.

<p>business</p> Signup and view all the answers

Pictures taken and left on mobile telephones have had significant impacts on the careers of some ______.

<p>employees</p> Signup and view all the answers

The website of the business can do unpresented damage and requires special care and ______ to ensure objectives are achieved.

<p>control</p> Signup and view all the answers

The business web site is unique and must be considered as a separate ______.

<p>entity</p> Signup and view all the answers

An employee has a company mobile ______, and becomes disgruntled with the business.

<p>phone</p> Signup and view all the answers

This is unpleasant but not business ______.

<p>threatening</p> Signup and view all the answers

The tools have common challenges and issues regarding ______, access, and cost.

<p>use</p> Signup and view all the answers

Study Notes

Importance of Tool Management

  • Small tools represent an investment for businesses and require significant control to prevent loss or excessive use.
  • Loss of tools can incur substantial costs, impacting overall business finances.
  • Proper training is essential to prevent user injury and damage to tools or equipment.

Theft and Security Risks

  • Attractive tools can be targets for theft or misuse.
  • Business tools need to be secured to mitigate risks associated with their loss.

Telecommunication Management

  • Call-barring can restrict access to specific numbers, such as international or mobile calls.
  • Managers can have overriding codes for wider access based on established agreements.

Employee Use and Internet Policy

  • Personal use of business tools, such as mobile phones, is typically restricted to mitigate risks.
  • Non-essential downloads can hinder internet performance and introduce security threats, including exposing systems to malware.
  • Sending personal emails through business systems increases the risk of misuse and potential disciplinary action.

Impact of Digital Tools

  • Personal photos on employee devices have the potential to affect professional reputations adversely.
  • Businesses must exercise care in managing online presence to avoid damaging effects.

Website Management

  • Business websites are distinct and require careful management to avoid negative repercussions.
  • Uncontrolled usage of company resources can lead to financial waste and potential data breaches.

Tool Roster System

  • Implementing a roster is beneficial for scheduling use of shared tools, aiding in planning and resource allocation.
  • Simple tools can be booked through diary systems, whether paper-based or electronic.

Password Management

  • Strong passwords are crucial; rules may include length, character type, and composition requirements.
  • Systems must have a secure method for resetting forgotten passwords to maintain security integrity.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on the importance and risks of small business tools. This quiz covers aspects like investment significance and control measures necessary for maintaining these tools. Evaluate your understanding of management strategies in a business context.

More Like This

Business Management Tools Overview
10 questions
Business Investment and Tool Management
40 questions
Business Data Management and Tools
16 questions
Use Quizgecko on...
Browser
Browser